Sadly the media calls the lawful use of a warrant a 'raid' but that's another issue.

The warrant will have detailed what it is they are looking for, French warrants (and legal system!) are quite a bit different than the US but in broad terms operate similarly. It suggests that an enforcement agency believes that there is evidence of a crime at the offices.

As a former IT/operations guy I'd guess they want on-prem servers with things like email and shared storage, stuff that would hold internal discussions about the thing they were interested in, but that is just my guess based on the article saying this is related to the earlier complaint that Grok was generating CSAM on demand.

It is a raid in that it's not expected, it relies on not being expected, and they come and take away your stuff by force. Maybe it's a legal raid, but let's not sugar coat it, it's still a raid and whether you're guilty or not it will cause you a lot of problems.

I mean it's not like people get advanced notice of search warrants of that police ask pretty please. I agree that the way people use the term it's a fine usage but the person using is trying to paint a picture of a SWAT team busting down the door by calling it that.

> I'd guess they want on-prem servers with things like email and shared storage

For a net company in 2026? Fat chance.

Agreed its a stretch, my experience comes from Google when I worked there and they set up a Chinese office and they were very carefully trying to avoid anything on premises that could searched/exploited. It was a huge effort, one that wasn't done for the European and UK offices where the government was not an APT. So did X have the level of hygiene in France? Were there IT guys in the same vein as the folks that Elon recruited into DOGE? Was everyone in the office "loyal"?[1] I doubt X was paranoid "enough" in France not to have some leakage.

[1] This was also something Google did which was change access rights for people in the China office that were not 'vetted' (for some definition of vetted) feeling like they could be an exfiltration risk. Imagine a DGSE agent under cover as an X employee who carefully puts a bunch of stuff on a server in the office (doesn't trigger IT controls) and then lets the prosecutors know its ready and they serve the warrant.

Part of the prosecution will be to determine who put the content on the server.

Under GDPR if a company processes European user data they're obligated to make a "Record of Processing Activities" available on demand (umbrella term for a whole bunch of user-data / identity related stuff). They don't necessarily need to store them onsite but they need to be able to produce them. Saying you're an internet company doesn't mean you can just put the stuff on a server in the Caribbean and shrug when the regulators come knocking on your door

That's aside from the fact that they're a publicly traded company under obligation to keep a gazillion records anyway like in any other jurisdiction.

> publicly traded company

Which company is publicly traded?

> They don't necessarily need to store them onsite but they need to be able to produce them.

... within 30 days, right? The longest "raid" in history.

Who has on prem servers at an office location?

I'm guessing you're asking this because you have a picture of a 'server' as a thing in a large rack? Nearly every tech business has a bunch of machines, everything from an old desk top to last year's laptop, which have been reinstalled with Linux or *BSD and are sitting on the network behaving, for all intents and purposes, as a 'server.' (they aren't moving or rebooting or having local sessions running on them, Etc).

I've worked in several companies and have never seen this. Maybe for a small scale startup or rapidly growing early stage company. I would be pretty shocked to see an old desktop acting as a server nowadays.